128 Incident Response jobs in Singapore
Incident Response Specialist
Posted today
Job Viewed
Job Description
Job Title: Incident Response Specialist
We are seeking a highly skilled Incident Response Specialist to join our team. The successful candidate will be responsible for delivering exceptional support to our data centre operations, responding to alarms and alerts, and providing detailed records of incident handling activities.
Key Responsibilities:
- Deliver high-quality data centre operations support across multiple locations
- Respond to all alarms and alerts in real-time
- Provide deep understanding and intelligence of critical incidents to resolver groups
- Ensure accurate and detailed records of alarm handling activities
- Support program managers and facilitate project deliverables
- Conduct root cause analysis to determine recurring problems
- Employ questioning and analysis techniques to determine underlying causes
Requirements:
- Diploma or degree in Information Technology
- 2+ years of experience in command center, service center, or similar 24x7 operations environment
- Ability to quickly triage multiple incidents and assign priority based on risk and confidence levels
- Knowledge of technical elements associated with systems such as IP Networks, DC Environment, and Server Health
- Excellent verbal and written communication skills, ability to work with minimal direction, meet goals, and maintain attention to detail
- Ability to successfully interact at all levels of the organization, including with clients, while functioning as a team player
- Basic working knowledge of data protection policies such as GDPR and the need to keep sensitive information secure
Incident Response Analyst
Posted today
Job Viewed
Job Description
• Deliver data centre operations support across multiple data centres
• Respond to all alarms/alerts set in Data Center Infrastructure Management (DCIM), Server Automation Operations System (SAOS), CCTV, Access Control Systems (ACS), and other functions (EHS, Security, etc),
• Provide deep understanding and intelligence of the criticality and impact of the incidents to the resolver groups.
• Ensure detailed records of alarm handling activities, including actions taken, resolutions in ticketing tools and file incident reports.
• Be available to coordinate as an incident commander in event of an issue.
• Support program managers and facilitate project deliverables, improve overall operational and engineering initiatives.
• Conduct root cause analysis (RCA) to determine recurring problems to their source.
• Employ in-depth questioning and analysis techniques such as five whys to determine the underlying cause of the incident or problem.
• Handle ticketing system
• Perform duties in compliance with SOP.
Requirements:
• Diploma/Degree in Information Technology.
• 2 years+ experience in command center, service center, or similar 24x7 operations center environment
• Ability to quickly triage multiple incidents and assign the right priority based on risk and confidence levels
• Knowledge of technical elements associated with systems such as IP Networks, DC Environment and Server Health.
• Outstanding verbal and written communication skills required, work with minimal direction, meeting goals, attention to details and an eye for continuous improvements
• Ability to successfully interact at all levels of the organization, including with clients, while functioning as a team player required.
• Basic working knowledge of data protection policies such as GDPR and the need to keep sensitive information secure.
Incident Response Expert
Posted today
Job Viewed
Job Description
This role is an excellent opportunity to join a dynamic team and utilize your technical skills to assist clients in responding to cyber security incidents. As a Cyber Response Specialist, you will play a key part in helping clients manage the aftermath of a cyber attack, including identifying the root cause of the incident, containing the breach, and providing recommendations for future prevention.
Responsibilities- Manage the response to cyber security incident response engagements
- Help with commercial proposals to clients based on existing templates
- Coach and manage colleagues
- Be hands-on as required to deliver incident response & digital forensics engagements
- Work directly with end clients and help them deal with their cyber security challenges
We value flexibility and work-life balance, offering our staff the ability to set their working hours through our 'Take Charge' program. This role requires self-motivation, strong desire to learn, and willingness to share knowledge with the team. If you are a driven individual with experience in technical roles in cyber security and a passion for Incident Response and Digital Forensics, we would like to hear from you.
Incident Response Analyst
Posted today
Job Viewed
Job Description
Responsibilities:
• Deliver data centre operations support across multiple data centres
• Respond to all alarms/alerts set in Data Center Infrastructure Management (DCIM), Server Automation Operations System (SAOS), CCTV, Access Control Systems (ACS), and other functions (EHS, Security, etc),
• Provide deep understanding and intelligence of the criticality and impact of the incidents to the resolver groups.
• Ensure detailed records of alarm handling activities, including actions taken, resolutions in ticketing tools and file incident reports.
• Be available to coordinate as an incident commander in event of an issue.
• Support program managers and facilitate project deliverables, improve overall operational and engineering initiatives.
• Conduct root cause analysis (RCA) to determine recurring problems to their source.
• Employ in-depth questioning and analysis techniques such as five whys to determine the underlying cause of the incident or problem.
• Handle ticketing system
• Perform duties in compliance with SOP.
Requirements:
• Diploma/Degree in Information Technology.
• 2 years+ experience in command center, service center, or similar 24x7 operations center environment
• Ability to quickly triage multiple incidents and assign the right priority based on risk and confidence levels
• Knowledge of technical elements associated with systems such as IP Networks, DC Environment and Server Health.
• Outstanding verbal and written communication skills required, work with minimal direction, meeting goals, attention to details and an eye for continuous improvements
• Ability to successfully interact at all levels of the organization, including with clients, while functioning as a team player required.
• Basic working knowledge of data protection policies such as GDPR and the need to keep sensitive information secure.
Switches
Troubleshooting
Incident Response
Hardware
Ticketing
Data Center
Root Cause Analysis
Information Technology
Access Control
CCTV
IP
Networking
Attention to Details
network servers
Routers
Cabling
Security Incident Response
Manager, Incident Response & Management
Posted today
Job Viewed
Job Description
Who we are
About Stripe
Stripe is a financial infrastructure platform for businesses. Millions of companies—from the world’s largest enterprises to the most ambitious startups—use Stripe to accept payments, grow their revenue, and accelerate new business opportunities. Our mission is to increase the GDP of the internet, and we have a staggering amount of work ahead. That means you have an unprecedented opportunity to put the global economy within everyone’s reach while doing the most important work of your career.
About the teamThe Incident Response team is a global 24/7 team responsible for driving incident response and management from detection to resolution. Stripe is proud of its five 9s API reliability and this team is at the forefront of ensuring we keep it that way - working hand-in-hand with Reliability Eng and across the Tech Org. This team of incident response managers (IRM) is defined by our sense of ownership and how we drive incidents to resolution - marshaling the necessary cross-functional resources to respond to and resolve service outages, critical bugs, security attacks and anything that significantly impacts the users of our products. The team is user-first and ensures appropriate external communications from Stripe and senior management to keep our users informed of disruption to their experience of Stripe. The team is highly skilled in incident troubleshooting, program management, incident classifications, incident communications, incident escalation and technical adeptness as incidents can arise from anywhere and cut across products and orgs in Stripe.
What you’ll doThis position entails leading and optimizing Stripe's incident management processes and automation, ensuring efficiency and adherence to stringent incident response metrics. As the head of the incident response team, you will establish and maintain a best-in-class incident response framework, upholding the reliability standards expected of Stripe. Responsibilities include but are not limited to incident classification, escalation, and notification management, along with accountability for key incident response metrics (TTx). You will generate actionable insights to drive continuous improvement, collaborating with engineering leadership to refine incident detection, response, user communication, and tooling efficacy. Leadership and development of a highly effective 24/7 global incident response management team, characterized by urgency, programmatic ownership of incidents and communications, and the capacity to engage engineering teams, are crucial. Additionally, you will manage incident communications across multiple channels for executive and end-user audiences, and identify automation opportunities to streamline incident response workflows, thereby safeguarding users and minimizing disruption to their operations.
Responsibilities- Lead the global 24/7 team of regional managers and incident response managers with ability to be hands-on and support frontline on-call with speed, cross-functional collaboration and escalation
- Develop and own Stripe's incident response and management strategy and cross-functional roadmap, ensuring it aligns with the company's reputation for reliability.
- Spearhead and manage Stripe's AI-First strategy for automation of incident response workflows, partnering with the engineering team to implement required tooling enhancements.
- Enhance Stripe's incident response by leading and implementing improvements derived from analyzing user-facing incidents and extracting actionable insights and learnings.
- Collaborate closely with executive leadership, engineering, and operations teams to lead significant programs and reshape workflows and metrics concerning reliability and incident operations.
- Manage relevant TTx metrics, particularly those related to communication and escalation. Collaborate with engineering leadership to implement necessary improvements for each metric.
- Develop user-focused metrics and data to guide Stripe's incident response, reliability strategy, and user communications (including RCAs), ensuring impactful decision-making.
We’re looking for someone who meets the minimum requirements to be considered for the role. If you meet these requirements, you are encouraged to apply. The preferred qualifications are a bonus, not a requirement.
Minimum requirements- 5+ years of management experience, including 2+ years of experience managing managers with a proven record in building, growing and transforming teams.
- Extensive experience (4+ years) leading incident response for complex, large-scale distributed services with high SLOs/SLAs, coupled with deep expertise in crisis management.
- Demonstrated ability to lead, influence other leaders and deliver complex strategic projects involving multiple stakeholders
- Strong analytical skills, and the ability to use data to drive business decisions
- Possesses proficiency in basic incident troubleshooting and a reasonable understanding of system architecture. Fluent in using SQL, Splunk, or similar query languages.
- Exceptional communication abilities, capable of adapting incident updates for diverse audiences (executives, external users, internal teams).
- Affinity for a fast paced work environment, crafting strategic and rapid fixes to high intensity problems with a keen eye for detail and a high bar for quality
- Comfort navigating ambiguity, while identifying areas for process improvement and establishing best practices
- Experience managing geographically dispersed teams
- Experience using infrastructure and application monitoring tools such as Prometheus, Sentry and others
- Experience in incident response at a high-growth technology company, preferably within the payments or e-commerce sectors.
- Proven ability to apply Agentic and Generative AI to revolutionize incident response, coupled with a strong grasp of current industry trends in the incident response domain.
- Demonstrated history of driving engineering and process enhancements to improve incident response efficiency within a rapidly expanding technology organization.
Incident Response Manager, Singapore
Posted today
Job Viewed
Job Description
Join to apply for the Incident Response Manager, Singapore role at Blackpanda
About Blackpanda
Blackpanda is Asia’s premier cyber crisis response firm, founded by former military special operations forces and cyber defense experts. Headquartered in Singapore, we specialize in incident response and digital forensics across the Asia-Pacific region.
Our mission is to democratize cyber resilience by providing organizations of all sizes with top-tier incident response and insurance solutions, enabling secure and sustainable operations in an increasingly hostile digital landscape.
We are building the world’s first Cyber In-Extremis Force (CIF), an elite digital crisis response unit inspired by Tier-1 military capabilities. Our team doesn’t just respond to cyber threats; we dominate them.
Core Values
- Sincerity: We deliver on our commitments.
- Unity: We debate fiercely but act together.
- Efficiency: We prioritize timing, precision, and leverage.
- Humility: We listen, act, and learn.
- Grit: We face setbacks head-on and persevere.
Your Mission: Incident Responder
You will manage cybersecurity investigations, coordinate with stakeholders, and guide organizations through digital crises. The role requires technical expertise, strategic leadership, and calmness under pressure.
Not all cases are complex; some are routine or chaotic. Your goal is to bring clarity, lead calmly, and transform disorder into operational control. You must be adaptable, open-minded, and solution-focused. Blackpanda emphasizes speed, precision, and decisive action, training relentlessly to deliver excellence.
Core Responsibilities
- Lead high-stakes cyber incident investigations for rapid containment and recovery.
- Analyze forensic artifacts, attacker TTPs, and malware across various infrastructures.
- Perform DFIR operations including disk imaging, memory analysis, and threat hunting.
- Use scripting (Python, Bash, PowerShell) to automate workflows and simulate adversaries.
- Communicate findings clearly to clients, executives, and regulators.
- Collaborate with engineering teams to improve tools and processes.
- Coordinate with legal, insurance, vendor, and government stakeholders.
- Assist sales teams with technical insights for engagements.
- Mentor junior analysts to uphold operational standards.
Minimum Requirements
- Open only to Singaporean candidates.
- 3+ years in cybersecurity incident response, security operations, digital forensics, or threat intelligence.
- Strong technical knowledge of enterprise networks, security architecture, and cloud environments.
- Experience with key DFIR tools (Splunk, ELK, SentinelOne, etc.).
- Proficiency with Windows, Linux, and macOS investigations.
- Scripting skills in Python, Bash, or PowerShell.
- Calm, decisive leadership in high-pressure IR engagements.
- Ability to communicate complex findings to senior stakeholders.
Preferred Qualifications
- Certifications like GCFA, GNFA, GREM, OSCP.
- Experience with ransomware, dark web intelligence, or threat actor tracking.
- OT/ICS experience in critical infrastructure environments.
- Building cybersecurity tools or contributing to open-source projects.
- Military, law enforcement, or intelligence backgrounds are a plus.
We value mindset: grit, discipline, and calmness under fire. If you’re experienced, resilient, and eager to push further, join us.
Seniority level- Mid-Senior level
- Full-time
- Information Technology
- Computer and Network Security
Manager, Incident Response & Management
Posted today
Job Viewed
Job Description
Stripe is a financial infrastructure platform for businesses. Millions of companies—from the world’s largest enterprises to the most ambitious startups—use Stripe to accept payments, grow their revenue, and accelerate new business opportunities. Our mission is to increase the GDP of the internet, and we have a staggering amount of work ahead. That means you have an unprecedented opportunity to put the global economy within everyone’s reach while doing the most important work of your career.
About the teamThe Incident Response team is a global 24/7 team responsible for driving incident response and management from detection to resolution. Stripe is proud of its five 9s API reliability and this team is at the forefront of ensuring we keep it that way - working hand-in-hand with Reliability Eng and across the Tech Org. This team of incident response managers (IRM) is defined by our sense of ownership and how we drive incidents to resolution - marshaling the necessary cross-functional resources to respond to and resolve service outages, critical bugs, security attacks and anything that significantly impacts the users of our products. The team is user-first and ensures appropriate external communications from Stripe and senior management to keep our users informed of disruption to their experience of Stripe. The team is highly skilled in incident troubleshooting, program management, incident classifications, incident communications, incident escalation and technical adeptness as incidents can arise from anywhere and cut across products and orgs in Stripe.
What you’ll doThis position entails leading and optimizing Stripe's incident management processes and automation, ensuring efficiency and adherence to stringent incident response metrics. As the head of the incident response team, you will establish and maintain a best-in-class incident response framework, upholding the reliability standards expected of Stripe. Responsibilities include but are not limited to incident classification, escalation, and notification management, along with accountability for key incident response metrics (TTx). You will generate actionable insights to drive continuous improvement, collaborating with engineering leadership to refine incident detection, response, user communication, and tooling efficacy. Leadership and development of a highly effective 24/7 global incident response management team, characterized by urgency, programmatic ownership of incidents and communications, and the capacity to engage engineering teams, are crucial. Additionally, you will manage incident communications across multiple channels for executive and end-user audiences, and identify automation opportunities to streamline incident response workflows, thereby safeguarding users and minimizing disruption to their operations.
Responsibilities- Lead the global 24/7 team of regional managers and incident response managers with ability to be hands-on and support frontline on-call with speed, cross-functional collaboration and escalation
- Develop and own Stripe's incident response and management strategy and cross-functional roadmap, ensuring it aligns with the company's reputation for reliability.
- Spearhead and manage Stripe's AI-First strategy for automation of incident response workflows, partnering with the engineering team to implement required tooling enhancements.
- Enhance Stripe's incident response by leading and implementing improvements derived from analyzing user-facing incidents and extracting actionable insights and learnings.
- Collaborate closely with executive leadership, engineering, and operations teams to lead significant programs and reshape workflows and metrics concerning reliability and incident operations.
- Manage relevant TTx metrics, particularly those related to communication and escalation. Collaborate with engineering leadership to implement necessary improvements for each metric.
- Develop user-focused metrics and data to guide Stripe's incident response, reliability strategy, and user communications (including RCAs), ensuring impactful decision-making.
We’re looking for someone who meets the minimum requirements to be considered for the role. If you meet these requirements, you are encouraged to apply. The preferred qualifications are a bonus, not a requirement.
- 5+ years of management experience, including 2+ years of experience managing managers with a proven record in building, growing and transforming teams.
- Extensive experience (4+ years) leading incident response for complex, large-scale distributed services with high SLOs/SLAs, coupled with deep expertise in crisis management.
- Demonstrated ability to lead, influence other leaders and deliver complex strategic projects involving multiple stakeholders
- Strong analytical skills, and the ability to use data to drive business decisions
- Possesses proficiency in basic incident troubleshooting and a reasonable understanding of system architecture. Fluent in using SQL, Splunk, or similar query languages.
- Exceptional communication abilities, capable of adapting incident updates for diverse audiences (executives, external users, internal teams).
- Affinity for a fast paced work environment, crafting strategic and rapid fixes to high intensity problems with a keen eye for detail and a high bar for quality
- Comfort navigating ambiguity, while identifying areas for process improvement and establishing best practices
- Experience managing geographically dispersed teams
- Experience using infrastructure and application monitoring tools such as Prometheus, Sentry and others
- Experience in incident response at a high-growth technology company, preferably within the payments or e-commerce sectors.
- Proven ability to apply Agentic and Generative AI to revolutionize incident response, coupled with a strong grasp of current industry trends in the incident response domain.
- Demonstrated history of driving engineering and process enhancements to improve incident response efficiency within a rapidly expanding technology organization.
The annual salary range for this role in the primary location is S$208,000 - S$312,000. This range may change if you are hired in another location. For sales roles, the range provided is the role’s On Target Earnings (“OTE”) range, meaning that the range includes both the sales commissions/sales bonuses target and annual base salary for the role. This salary range may be inclusive of several career levels at Stripe and will be narrowed during the interview process based on a number of factors, including the candidate’s experience, qualifications, and specific location. Applicants interested in this role and who are not located in the primary location may request the annual salary range for their location during the interview process.
Specific benefits and details about what compensation is included in the salary range listed above will vary depending on the applicant’s location and can be discussed in more detail during the interview process. Benefits/additional compensation for this role may include: equity, company bonus or sales commissions/bonuses; retirement plans; health benefits; and wellness stipends.
At Stripe, we're looking for people with passion, grit, and integrity. You're encouraged to apply even if your experience doesn't precisely match the job description. Your skills and passion will stand out—and set you apart—especially if your career has taken some extraordinary twists and turns. At Stripe, we welcome diverse perspectives and people who think rigorously and aren't afraid to challenge assumptions. Join us.
#J-18808-LjbffrBe The First To Know
About the latest Incident response Jobs in Singapore !
Lead, Cybersecurity Incident Response
Posted today
Job Viewed
Job Description
Join to apply for the Lead, Cybersecurity Incident Response role at StarHub
Job DescriptionThe Assistant Manager - Incident Response and Threat Hunting is responsible for leading the detection, investigation, and mitigation of cybersecurity incidents. This role involves proactive threat hunting, forensic analysis, and developing response strategies to minimize risks and impact on an organization's IT infrastructure. The specialist collaborates with cross-functional teams to improve security posture and ensure compliance with industry standards.
The candidate will report to the Head of Incident Response Team and will plan and oversee the performance of security responses to security incidents in an IT environment. They will present cyber-incident reports to senior leaders and identify root causes of cyber threats.
Responsibilities- Lead the response to cybersecurity incidents, including malware infections, data breaches, and insider threats.
- Perform real-time and retrospective analysis of security events to identify threats.
- Coordinate with MSSP Security Operations Centre (SOC) teams for monitoring and alerting.
- Develop and document incident response plans and playbooks.
- Handle incidents end-to-end with expertise.
- Conduct proactive threat hunting to identify unknown threats.
- Perform digital forensic analysis on compromised systems to determine root causes.
- Use forensic tools to collect and analyze logs, memory dumps, and disk images.
- Work with SIEM tools to detect anomalous behaviors.
- Analyze logs from firewalls, IDS/IPS, endpoint protection, and cloud security tools.
- Improve detection capabilities by tuning security alerts and developing rules.
- Recommend and implement security controls to reduce exposure.
- Provide technical leadership to junior responders and analysts.
- Tertiary Education in Computer Science / Engineering or equivalent.
- At least 5 years of relevant experience.
- Strong expertise in incident response, threat hunting, and forensic analysis.
- Experience with SIEM tools (e.g., Elastic, Splunk).
- Proficiency in network security, malware analysis, and log analysis.
- Familiarity with cloud security (AWS, Azure, GCP) and container security.
- Experience with cloud security tools and AI-powered security analytics (AWS Guard Duty, Azure Sentinel, Google Chronicle).
- Familiarity with AI/ML-driven anomaly detection and behavioral analysis techniques.
- Knowledge of security solutions (EDR, XDR, NDR, WAF, Proxy, Firewall, Email Security).
- Scripting and automation skills (Python, PowerShell, Bash).
- Deep understanding of MITRE ATT&CK framework, cyber kill chain, and machine learning models for cybersecurity applications.
- Excellent communication and report-writing skills, with the ability to work under pressure.
- Seniority level: Mid-Senior level
- Employment type: Full-time
- Job function: Information Technology
- Industries: Technology, Information and Media, and Information Services
Cybersecurity Incident Response Consultant
Posted today
Job Viewed
Job Description
Join to apply for the Cybersecurity Incident Response Consultant role at Amaris Consulting
Cybersecurity Incident Response Consultant1 day ago Be among the first 25 applicants
Join to apply for the Cybersecurity Incident Response Consultant role at Amaris Consulting
Who are we?
Amaris Consulting is an independent technology consulting firm providing guidance and solutions to businesses. With more than 1,000 clients across the globe, we have been rolling out solutions in major projects for over a decade – this is made possible by an international team of 7,600 people spread across 5 continents and more than 60 countries. Our solutions focus on four different Business Lines: Information System & Digital, Telecom, Life Sciences and Engineering. We’re focused on building and nurturing a top talent community where all our team members can achieve their full potential. Amaris is your steppingstone to cross rivers of change, meet challenges and achieve all your projects with success.
At Amaris, we strive to provide our candidates with the best possible recruitment experience. We like to get to know our candidates, challenge them, and be able to give them proper feedback as quickly as possible. Here's what our recruitment process looks like:
Brief Call : Our process typically begins with a brief virtual/phone conversation to get to know you! The objective? Learn about you, understand your motivations, and make sure we have the right job for you!
Interviews (the average number of interviews is 3 - the number may vary depending on the level of seniority required for the position). During the interviews, you will meet people from our team: your line manager of course, but also other people related to your future role. We will talk in depth about you, your experience, and skills, but also about the position and what will be expected of you. Of course, you will also get to know Amaris: our culture, our roots, our teams, and your career opportunities!
Case study : Depending on the position, we may ask you to take a test. This could be a role play, a technical assessment, a problem-solving scenario, etc.
As you know, every person is different and so is every role in a company. That is why we have to adapt accordingly, and the process may differ slightly at times. However, please know that we always put ourselves in the candidate's shoes to ensure they have the best possible experience.
We look forward to meeting you!
Job Description
ABOUT THE JOB
- Maintain and update the incident response plan (IRP) and its appendices
- Refine incident-specific playbooks for various environments
- Improve processes with legal and communication departments
- Conduct and document post-incident lessons learned and propose improvements
- Act as Incident Commander and coordinate response activities with internal stakeholders
- Declare incidents based on risk and regulation criteria and follow through with mitigation and recovery actions
- Prioritize forensic and analysis tasks based on severity and impact
- Support audits by providing documented evidence of incident response activities
- Academic background: Degree in cybersecurity, information systems, computer science, or a related STEM field
- Experience with information security incident management standards (ISO 27035, NIST, SANS)
- Understanding of SOC processes and forensics techniques
- Knowledge of security tools and incident response techniques
- Certification: GCFA, CIH, CISSP, CEH, ECSA, or ITIL Foundation
- Experience in the transportation, logistics or maritime sector is a plus
- Experience with CERT, SOC, GRC or SecOps roles (5+ years)
- You can stay calm under pressure and synthesize in moments of urgency
- You have an ability to convey clear messages to both technical and executive stakeholders
- You have an ability to synthetize
At Amaris Consulting, we believe in creating a thriving, positive workplace where every team member can grow, connect, and make a real impact. Here’s what you can expect when you join our dynamic community:
- Global Diversity: Be part of an international team of 110+ nationalities, celebrating diverse perspectives and collaboration.
- Trust and Growth: With 70% of our leaders starting at entry-level, we’re committed to nurturing talent and empowering you to reach new heights.
- Continuous Learning: Unlock your full potential with our internal Academy and over 250 training modules designed for your professional growth.
- Vibrant Culture: Enjoy a workplace where energy, fun, and camaraderie come together through afterworks, networking events, and more.
- Meaningful Impact: Join us in making a difference through our CSR initiatives, including the WeCare Together program, and be part of something bigger.
Amaris Consulting is proud to be an equal opportunity workplace. We are committed to promoting diversity within the workforce and creating an inclusive working environment. For this purpose, we welcome applications from all qualified candidates regardless of gender, sexual orientation, race, ethnicity, beliefs, age, marital status, disability, or other characteristics. Seniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries IT Services and IT Consulting
Referrals increase your chances of interviewing at Amaris Consulting by 2x
Sign in to set job alerts for “Cyber Security Consultant” roles. Third-Party Security Risk Management, Consultant Cybersecurity Consultant/Mgr (Cybersecurity Governance and Risk Assessment), SCD Deputy Manager (IT Cyber Security) - Contract Technology & Cyber Security Risk Analyst Cybersecurity Consultancy and Solutioning (1-year traineeship programme) Security Consultant (Microsoft Purview)|Contract Cyber Engagement Lead, Mandiant Consulting, Google Cloud Cyber Security Consultant - Red Team Specialist Senior Security Consultant (Governance Risk & Compliance) AVP/VP (12 months contract), Cybersecurity (Governance Oversight) TDI – Technology Information Security Officer (TISO) – VP Principal Consultant – Infrastructure and Cybersecurity (Senior) Cyber Security Consultant & Penetration Tester Consultant/Senior Consultant, Data Protection Specialist Cybersecurity Consultant (Cloud Security) Cyber Security Consultant (Endpoint Deployment)Kallang, Central Singapore Community Development Council, Singapore 1 month ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrManager, Incident Response & Management
Posted today
Job Viewed
Job Description
Who we are About Stripe
Stripe is a financial infrastructure platform for businesses. Millions of companies—from the world’s largest enterprises to the most ambitious startups—use Stripe to accept payments, grow their revenue, and accelerate new business opportunities. Our mission is to increase the GDP of the internet, and we have a staggering amount of work ahead. That means you have an unprecedented opportunity to put the global economy within everyone’s reach while doing the most important work of your career.
About the teamThe Incident Response team is a global 24/7 team responsible for driving incident response and management from detection to resolution. Stripe is proud of its five 9s API reliability and this team is at the forefront of ensuring we keep it that way - working hand-in-hand with Reliability Eng and across the Tech Org. This team of incident response managers (IRM) is defined by our sense of ownership and how we drive incidents to resolution - marshaling the necessary cross-functional resources to respond to and resolve service outages, critical bugs, security attacks and anything that significantly impacts the users of our products. The team is user-first and ensures appropriate external communications from Stripe and senior management to keep our users informed of disruption to their experience of Stripe. The team is highly skilled in incident troubleshooting, program management, incident classifications, incident communications, incident escalation and technical adeptness as incidents can arise from anywhere and cut across products and orgs in Stripe.
What you’ll doThis position entails leading and optimizing Stripe's incident management processes and automation, ensuring efficiency and adherence to stringent incident response metrics. As the head of the incident response team, you will establish and maintain a best-in-class incident response framework, upholding the reliability standards expected of Stripe. Responsibilities include but are not limited to incident classification, escalation, and notification management, along with accountability for key incident response metrics (TTx). You will generate actionable insights to drive continuous improvement, collaborating with engineering leadership to refine incident detection, response, user communication, and tooling efficacy. Leadership and development of a highly effective 24/7 global incident response management team, characterized by urgency, programmatic ownership of incidents and communications, and the capacity to engage engineering teams, are crucial. Additionally, you will manage incident communications across multiple channels for executive and end-user audiences, and identify automation opportunities to streamline incident response workflows, thereby safeguarding users and minimizing disruption to their operations.
Responsibilities- Lead the global 24/7 team of regional managers and incident response managers with ability to be hands-on and support frontline on-call with speed, cross-functional collaboration and escalation
- Develop and own Stripe's incident response and management strategy and cross-functional roadmap, ensuring it aligns with the company's reputation for reliability.
- Spearhead and manage Stripe's AI-First strategy for automation of incident response workflows, partnering with the engineering team to implement required tooling enhancements.
- Enhance Stripe's incident response by leading and implementing improvements derived from analyzing user-facing incidents and extracting actionable insights and learnings.
- Collaborate closely with executive leadership, engineering, and operations teams to lead significant programs and reshape workflows and metrics concerning reliability and incident operations.
- Manage relevant TTx metrics, particularly those related to communication and escalation. Collaborate with engineering leadership to implement necessary improvements for each metric.
- Develop user-focused metrics and data to guide Stripe's incident response, reliability strategy, and user communications (including RCAs), ensuring impactful decision-making.
We’re looking for someone who meets the minimum requirements to be considered for the role. If you meet these requirements, you are encouraged to apply. The preferred qualifications are a bonus, not a requirement.
Minimum requirements- 5+ years of management experience, including 2+ years of experience managing managers with a proven record in building, growing and transforming teams.
- Extensive experience (4+ years) leading incident response for complex, large-scale distributed services with high SLOs/SLAs, coupled with deep expertise in crisis management.
- Demonstrated ability to lead, influence other leaders and deliver complex strategic projects involving multiple stakeholders
- Strong analytical skills, and the ability to use data to drive business decisions
- Possesses proficiency in basic incident troubleshooting and a reasonable understanding of system architecture. Fluent in using SQL, Splunk, or similar query languages.
- Exceptional communication abilities, capable of adapting incident updates for diverse audiences (executives, external users, internal teams).
- Affinity for a fast paced work environment, crafting strategic and rapid fixes to high intensity problems with a keen eye for detail and a high bar for quality
- Comfort navigating ambiguity, while identifying areas for process improvement and establishing best practices
- Experience managing geographically dispersed teams
- Experience using infrastructure and application monitoring tools such as Prometheus, Sentry and others
- Experience in incident response at a high-growth technology company, preferably within the payments or e-commerce sectors.
- Proven ability to apply Agentic and Generative AI to revolutionize incident response, coupled with a strong grasp of current industry trends in the incident response domain.
- Demonstrated history of driving engineering and process enhancements to improve incident response efficiency within a rapidly expanding technology organization.
Office-assigned Stripes spend at least 50% of the time in a given month in their local office or with users. This hits a balance between bringing people together for in-person collaboration and learning from each other, while supporting flexibility about how to do this in a way that makes sense for individuals and their teams.
The annual salary range for this role in the primary location is S$208,000 - S$312,000. This range may change if you are hired in another location. For sales roles, the range provided is the role’s On Target Earnings (“OTE”) range, meaning that the range includes both the sales commissions/sales bonuses target and annual base salary for the role. This salary range may be inclusive of several career levels at Stripe and will be narrowed during the interview process based on a number of factors, including the candidate’s experience, qualifications, and specific location. Applicants interested in this role and who are not located in the primary location may request the annual salary range for their location during the interview process.
Specific benefits and details about what compensation is included in the salary range listed above will vary depending on the applicant’s location and can be discussed in more detail during the interview process. Benefits/additional compensation for this role may include: equity, company bonus or sales commissions/bonuses; retirement plans; health benefits; and wellness stipends.
Office locations
Singapore
Team
Infrastructure & Corporate Tech
Job type
Full time
#J-18808-Ljbffr